• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Excelitas Qioptiq banner

BATTLESPACE Updates

   +44 (0)77689 54766
   

  • Home
  • Features
  • News Updates
  • Defence Engage
  • Company Directory
  • About
  • Subscribe
  • Contact
  • Media Pack 2023

CYBER, EW, CLOUD AND HOMELAND SECURITY UPDATE

October 27, 2017 by

Sponsored by Spectra Cyber Security Solutions

Cyber Security Solutions


————————————————————————
26 Oct 17. CryptoniteNXT Moving Target Cyber Defense (MTD) Takes the Battle Back to the Attackers. Cryptonite, a leader in moving target cyber defense, launched today from stealth mode with the release of the company’s flagship network security solution, CryptoniteNXT. CryptoniteNXT enables any network to actively shield itself from cyber attacks by preventing all attacker reconnaissance and lateral movement. By challenging traditional trust assumptions, CryptoniteNXT proactively contains an attack well before it can be detected and removed by traditional means.
“CryptoniteNXT was built with defensive security in mind that can be applied to critical vulnerability use cases and protect against any level of adversary,” said Justin Yackoski, CTO, Cryptonite. “The network has become an easily infiltrated space that cannot be completely locked down. With CryptoniteNXT, we take away the attackers’ ability to ‘see’ within the network, making network attacks or data exfiltration attempts significantly more difficult and expensive for attackers.”
Research and development into Cryptonite’s ground breaking MTD technology started with funding from DoD and DHS. Spun out of a Maryland defense contractor, Intelligent Automation, Inc. (IAI), Cryptonite is led by Michael Simon, serial technology entrepreneur and President & CEO, and Justin Yackoski, former lead researcher at IAI and CTO. With a heritage in the defense space and a DC-bred team, Cryptonite is backed by cybersecurity investors, including Ron Gula, founder of Tenable, David Walker, founder of Pangia Technologies, Al Nardslico, founder of SMS, Abtin Buergari, founder of Modus eDiscovery, Don Rogers, co-founder of Shulman Rogers, and Dr. Leonard Haynes, co-founder of IAI.
“Cryptonite uniquely prevents adversaries from exfiltrating actionable information from networks. The other key capability is their fine-grained micro-segmentation which stops east-west traffic that has enabled the spread of ransomware,” said Ron Gula, principal at Gula Tech Adventures.
CryptoniteNXT is delivered as a network appliance that supplements existing network infrastructure to improve both wired and wireless security. A unique combination of technologies effectively alters network behavior in real time with no human intervention. CryptoniteNXT blocks malicious activities while at the same time preserving performance and usability for legitimate purposes. Network protection with CryptoniteNXT is therefore always on, checking that every packet is not exceeding necessary business functions, and limiting the attacker’s ability to progress along the Cyber Kill Chain.
(Source: BUSINESS WIRE)

26 Oct 17. In first, DIUx hands off cyber pilot project to Army. The Pentagon’s commercial technology hub has successfully transitioned a program from pilot to full-blown contract, a milestone for the 2-year-old office.
The Defense Innovation Unit Experimental, or DIUx, moved a pilot program with commercial cybersecurity firm Tanium into a $750m, five-year contract with the U.S. Army. That contract was signed Sept. 26.
Tanium provides endpoint (think laptops or desktops) cybersecurity monitoring for large-scale clients. While Tanium works with a number of major financial institutions, the U.S. Army requirement marks the company’s largest single-user base — up to 1 million endpoints under the contract.
If a bug or hack is found on one system, Tanium can run a search across all users in roughly 15 seconds, discovering where the vulnerability spread, explained Ralph Kahn, Tanium’s vice president for federal affairs at the company. And because Tanium keeps historic data, it can go backward and look for where the vulnerability first appeared as well as discover the impact it had on the infected system.
The contract is structured as a one-year guarante

Primary Sidebar

Advertisers

  • qioptiq.com
  • Exensor
  • TCI
  • Visit the Oxley website
  • Visit the Viasat website
  • Blighter
  • SPECTRA
  • Britbots logo
  • Faun Trackway
  • Systematic
  • CISION logo
  • ProTEK logo
  • businesswire logo
  • ProTEK logo
  • ssafa logo
  • Atkins
  • IEE
  • EXFOR logo
  • KME logo
  • DSEi
  • sibylline logo
  • Team Thunder logo
  • Commando Spirit - Blended Scoth Whisy
  • Comtech logo
Hilux Military Raceday Novemeber 2023 Chepstow

Contact Us

BATTLESPACE Publications
Old Charlock
Abthorpe Road
Silverstone
Towcester NN12 8TW

+44 (0)77689 54766

BATTLESPACE Technologies

An international defence electronics news service providing our readers with up to date developments in the defence electronics industry.

Recent News

  • EXHIBITIONS AND CONFERENCES

    January 27, 2023
    Read more
  • VETERANS UPDATE

    January 27, 2023
    Read more
  • MANAGEMENT ON THE MOVE

    January 27, 2023
    Read more

Copyright BATTLESPACE Publications © 2002–2023.

This website uses cookies to improve your experience. If you continue to use the website, we'll assume you're ok with this.   Read More  Accept
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT